Patents by Inventor William K. Hollis

William K. Hollis has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11038913
    Abstract: Disclosed herein is a system for generating and displaying information useful to help a security analyst understand a scale and a root cause of a potential security issue associated with a resource. The resource can include a server, a storage device, a user device (e.g., a personal computer, a tablet computer, a smartphone, etc.), a virtual machine, networking equipment, etc. The resource may be one that is under control of an entity operating a security operations center. Additionally or alternatively, the resource may be one that is configured to be monitored by the security operations center. The information provides the security analyst with a broader context of the potential security issue based on relationships between the potential security issues and other security issues. Consequently, the information enables the security analyst to implement more efficient and effective actions to handle the potential security issue.
    Type: Grant
    Filed: April 19, 2019
    Date of Patent: June 15, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Hani Hana Neuvirth, Sangeetha Madderla, Larry J. Matuska, William K. Hollis, Gueorgui Chkodrov, Yotam Livny
  • Publication number: 20200336505
    Abstract: Disclosed herein is a system for generating and displaying information useful to help a security analyst understand a scale and a root cause of a potential security issue associated with a resource. The resource can include a server, a storage device, a user device (e.g., a personal computer, a tablet computer, a smartphone, etc.), a virtual machine, networking equipment, etc. The resource may be one that is under control of an entity operating a security operations center. Additionally or alternatively, the resource may be one that is configured to be monitored by the security operations center. The information provides the security analyst with a broader context of the potential security issue based on relationships between the potential security issues and other security issues. Consequently, the information enables the security analyst to implement more efficient and effective actions to handle the potential security issue.
    Type: Application
    Filed: April 19, 2019
    Publication date: October 22, 2020
    Inventors: Hani Hana NEUVIRTH, Sangeetha MADDERLA, Larry J. MATUSKA, William K. HOLLIS, Gueorgui CHKODROV, Yotam LIVNY
  • Publication number: 20180270109
    Abstract: A network configuration management system can determine configuration settings for network devices and detect configuration setting errors in the configuration settings that can cause security vulnerabilities. The configuration setting errors can include a configuration setting value error or a supplemental access setting error. If the configuration settings include the configuration setting value error, a first remedial action can be executed, and if the configuration settings include the supplemental access setting error, a second remedial action can be executed. Also, network interface scanning can be initiated using network addresses extracted from the configuration settings.
    Type: Application
    Filed: March 15, 2017
    Publication date: September 20, 2018
    Applicant: Microsoft Technology Licensing, LLC
    Inventor: William K. HOLLIS
  • Patent number: 9893975
    Abstract: An in-line network tap includes a network tap chip that is configured to analyze or otherwise process data packets as the data packets are transmitted within a network. The network tap chip can be embedded within a communication cable, such as an Ethernet or USB cable, either within the flexible cable portion of the cable or within a connector on either end of the communication cable. Alternatively, the network tap chip can be embedded within a transceiver. The in-line network tap can perform various processing including monitoring network performance, facilitating remote troubleshooting, data buffering, and intrusion detection and prevention.
    Type: Grant
    Filed: June 25, 2015
    Date of Patent: February 13, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventor: William K Hollis
  • Publication number: 20170264427
    Abstract: System and methods for encrypting data, such as plaintext or binary data, on electronic devices are described. An electronic device can encrypt the data by receiving a string of one or more characters associated with the data to be encrypted, determining an entropy for an encrypted string, determining a position for each character of the one or more characters, generating an encrypted string for each character using the determined entropy and position of the respective character, and generating an encrypted message by concatenating the encrypted strings of the one or more characters together. In some examples, the electronic device encrypts the data using one or more pseudo-random number generators. In some examples, the electronic device can offset the one or more characters before the encrypting and/or offset characters in the encrypted strings after the encrypting. The electronic device can then send the encrypted message to another electronic device for decrypting.
    Type: Application
    Filed: March 11, 2016
    Publication date: September 14, 2017
    Inventor: William K. Hollis
  • Publication number: 20160380868
    Abstract: An in-line network tap includes a network tap chip that is configured to analyze or otherwise process data packets as the data packets are transmitted within a network. The network tap chip can be embedded within a communication cable, such as an Ethernet or USB cable, either within the flexible cable portion of the cable or within a connector on either end of the communication cable. Alternatively, the network tap chip can be embedded within a transceiver. The in-line network tap can perform various processing including monitoring network performance, facilitating remote troubleshooting, data buffering, and intrusion detection and prevention.
    Type: Application
    Filed: June 25, 2015
    Publication date: December 29, 2016
    Inventor: William K Hollis
  • Publication number: 20110173429
    Abstract: A method to reduce and thereby improve the initial program load time of a computing apparatus operating system and thus provides for near instantaneous user interaction. When practicing the instant invention, a computing apparatus operating system or application processing component is loaded neither sequentially nor completely, but rather on an as required basis. The invention's “required only” loading of processing components persist through subsequent operation and shut down of the computing apparatus with each loaded task creating a checkpoint record of processing modifications to non-volatile memory. Such checkpointing allows shut down processing of the apparatus to consist of merely flushing memory buffers in the apparatus checkpointed non-volatile memory of the apparatus to permanent storage and powering off of the apparatus, with subsequent initial program load (IPL) sequencing referencing the checkpointed records to minimize future system initialization elapsed time.
    Type: Application
    Filed: March 28, 2011
    Publication date: July 14, 2011
    Inventor: William K. Hollis
  • Publication number: 20090319547
    Abstract: A compression algorithm may use a hash function to compress a file. The hash function may be selected to have multiple collisions so that a compressed file may include the hash values and indexes to the collisions. In some cases, a database of data and their hash values may be built during compression, while in other cases a preexisting database may be used. A preexisting database may be used as a shared secret to provide security to the compressed file. In many embodiments, the compression algorithm may be used recursively to reduce the size of the file by using the same or different hash functions.
    Type: Application
    Filed: June 19, 2008
    Publication date: December 24, 2009
    Applicant: Microsoft Corporation
    Inventor: William K. Hollis
  • Patent number: 7299346
    Abstract: A method to reduce and thereby improve the initial program load time of a computing apparatus operating system and thus provides for near instantaneous user interaction. When practicing the instant invention, a computing apparatus operating system or application processing component is loaded neither sequentially nor completely, but rather on an as required basis. The invention's “required only” loading of processing components persist through subsequent operation and shut down of the computing apparatus with each loaded task creating a checkpoint record of processing modifications to non-volatile memory. Such checkpointing allows shut down processing of the apparatus to consist of merely flushing memory buffers in the apparatus checkpointed non-volatile memory of the apparatus to permanent storage and powering off of the apparatus, with subsequent initial program load (IPL) sequencing referencing the checkpointed records to minimize future system initialization elapsed time.
    Type: Grant
    Filed: January 14, 2003
    Date of Patent: November 20, 2007
    Inventor: William K. Hollis
  • Patent number: RE42936
    Abstract: A method to reduce and thereby improve the initial program load time of a computing apparatus operating system and thus provides for near instantaneous user interaction. When practicing the instant invention, a computing apparatus operating system or application processing component is loaded neither sequentially nor completely, but rather on an as required basis. The invention's “required only” loading of processing components persist through subsequent operation and shut down of the computing apparatus with each loaded task creating a checkpoint record of processing modifications to non-volatile memory. Such checkpointing allows shut down processing of the apparatus to consist of merely flushing memory buffers in the apparatus checkpointed non-volatile memory of the apparatus to permanent storage and powering off of the apparatus, with subsequent initial program load (IPL) sequencing referencing the checkpointed records to minimize future system initialization elapsed time.
    Type: Grant
    Filed: November 6, 2009
    Date of Patent: November 15, 2011
    Inventor: William K. Hollis